Security Research Center Policy

In today’s world we become more and more “tied up” to Internet services, software, hardware, etc. We share our information with them, we share our information with our banks, medical institution, we share our information with our employer who saves it in their databases. We share our information with smartphones, smart TV’s, smart watches, smart homes and other “smart things” which usually retain our information in the databases as well. Such technologies are deeply integrated into our lives so we become dependent on them. This makes us vulnerable when technology fails.

What are we doing?

We conduct security researches trying to locate any data exposures in databases of various companies, organisations, institutions, etc. Please take into account the fact that we do not hack into, break systems, databases, archives, directories, depositories or other storages that contain any personal information and that were protected from unauthorised access. All accessible databases that we discovered were unsecured and unprotected in any way.

Why do we do this?

Here, in the Security Research Center, we do our best to:

Help businesses build better security through identifying data leaks and raising awareness of cyber threats, and

Raise public awareness to the dangers related to data breaches and security risks they face everyday in the connected world.

We also have a good belief that our security researches will improve the security of personal data and alert users of breach possibilities.

How do we do our researches?

We make security researches with the help of Shodan search engine for Internet-connected devices. This search engine is publicly accessible. We do not use any hacking programmes, crack passwords or authentication processes or other hacking tricks.

The process of our vulnerability reporting comply with the following guideline:

When appropriate, we provide details of the data exposure to the company, organisation, institution, etc. which failed to protect itself;

We apply best practices to avoid privacy violations;

We do not modify the data we found;

We allow entities time to remedy the data exposure prior to making any details available publicly that would otherwise cause further risk;

We do not transfer any data we gained access to during our research to any third parties whatsoever.

Do we retain the information we found?

Yes, we retain some information we found but this is made solely for evidence purposes.

We retain this information to protect our company in disputes and proceedings, to comply with legal obligations, meet regulatory requirements, etc. By doing such researches we may be accused or being suspected in hacking so we are forced to make screenshots and/or store some information in order to something to back up our statements.

MacKeeper™ moving towards the Software-As-A-Service model

Please note that MacKeeper™ 3.x is not just an upgrade from the previous product versions; it is our first release in the all-new MacKeeper software-as-a-service lineup, which we will continue to develop moving forward. Because of the changes and enhancements in the product functionality and positioning, it made a lot of business sense for us to adjust the subscription model as well. It will allow us to develop and improve MacKeeper faster and serve our users better.

Also, this is the first software in the MacKeeper lineup that comes equipped with "human inside" technology – a customer assistance component integrated right into the software. With it, users no longer need to look for customer support numbers or emails; just the click of a button from within the interface and their SOS signals will be heard and promptly dealt with. Users can also activate their personal Geeks-on-Demand who can help with a multitude of issues and questions ranging from OS-related topics to choosing the right computer. In addition, all MacKeeper experts are certified by Apple.

Please note that since MK 3.x is not an upgrade, your current lifetime license will not apply. If you'd like to use MK 3.x you will need to purchase a separate license. We recommend a selection of subscription packages available for your convenience.

IMPORTANT: Your lifetime subscription for MacKeeper (1.x or 2.x) is not going to expire and you can continue using it with the relevant MK version (1.x or 2.x) as per normal.